Volgen
ida tucker
ida tucker
PhD student, ENS de Lyon
Geverifieerd e-mailadres voor ens-lyon.fr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Two-party ECDSA from hash proof systems and efficient instantiations
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
852019
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
832020
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2018
522018
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Theoretical Computer Science 939, 78-104, 2023
182023
Additive-homomorphic functional commitments and applications to homomorphic signatures
D Catalano, D Fiore, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
102022
Threshold Linearly Homomorphic Encryption on 
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
92022
Ring signatures with user-controlled linkability
D Fiore, L Garms, D Kolonelos, C Soriente, I Tucker
European Symposium on Research in Computer Security, 405-426, 2022
32022
Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups
I Tucker
Université de Lyon, 2020
32020
Efficient zero-knowledge proofs on signed data with applications to verifiable computation on data streams
D Fiore, I Tucker
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12022
Hardware security without secure hardware: How to decrypt with a password and a server
O Blazy, L Brouilhet, C Chevalier, P Towa, I Tucker, D Vergnaud
Theoretical Computer Science 895, 178-211, 2021
12021
Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe
I Tucker
Lyon, 2020
12020
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency
G Castagnos, F Laguillaumie, I Tucker
Theoretical Computer Science 914, 84-113, 2022
2022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–12